Alice and Bob explained

Alice and Bob are fictional characters commonly used as placeholders in discussions about cryptographic systems and protocols, and in other science and engineering literature where there are several participants in a thought experiment. The Alice and Bob characters were invented by Ron Rivest, Adi Shamir, and Leonard Adleman in their 1978 paper "A Method for Obtaining Digital Signatures and Public-key Cryptosystems".[1] Subsequently, they have become common archetypes in many scientific and engineering fields, such as quantum cryptography, game theory and physics.[2] As the use of Alice and Bob became more widespread, additional characters were added, sometimes each with a particular meaning. These characters do not have to refer to people; they refer to generic agents which might be different computers or even different programs running on a single computer.

Overview

Alice and Bob are the names of fictional characters used for convenience and to aid comprehension. For example, "How can Bob send a private message M to Alice in a public-key cryptosystem?" is believed to be easier to describe and understand than if the hypothetical people were simply named A and B as in "How can B send a private message M to A in a public-key cryptosystem?"

The names are conventional, and where relevant may use an alliterative mnemonic such as "Mallory" for "malicious" to associate the name with the typical role of that person.

History

Scientific papers about thought experiments with several participants often used letters to identify them, A, B, and C, etc.

The first mention of Alice and Bob in the context of cryptography was in Rivest, Shamir, and Adleman's 1978 article "A method for obtaining digital signatures and public-key cryptosystems." They wrote, "For our scenarios we suppose that A and B (also known as Alice and Bob) are two users of a public-key cryptosystem". Previous to this article, cryptographers typically referred to message senders and receivers as A and B, or other simple symbols. In fact, in the two previous articles by Rivest, Shamir, and Adleman, introducing the RSA cryptosystem, there is no mention of Alice and Bob.[3] [4] Possibly the choice of the first three names came from the film Bob & Carol & Ted & Alice.[5]

Within a few years, however, references to Alice and Bob in cryptological literature became a common trope. Cryptographers would often begin their academic papers with reference to Alice and Bob. For instance, Michael Rabin began his 1981 paper, "Bob and Alice each have a secret, SB and SA, respectively, which they want to exchange."[6] Early on, Alice and Bob were starting to appear in other domains, such as in Manuel Blum's 1981 article, "Coin Flipping by Telephone: A Protocol for Solving Impossible Problems," which begins, "Alice and Bob want to flip a coin by telephone."[7]

Although Alice and Bob were invented with no reference to their personality, authors soon began adding colorful descriptions. In 1983, Blum invented a backstory about a troubled relationship between Alice and Bob, writing, "Alice and Bob, recently divorced, mutually distrustful, still do business together. They live on opposite coasts, communicate mainly by telephone, and use their computers to transact business over the telephone."[8] In 1984, John Gordon delivered his famous[9] "After Dinner Speech" about Alice and Bob, which he imagines to be the first "definitive biography of Alice and Bob."[10]

In addition to adding backstories and personalities to Alice and Bob, authors soon added other characters, with their own personalities. The first to be added was Eve, the "eavesdropper." Eve was invented in 1988 by Charles Bennet, Gilles Brassard, and Jean-Marc Robert, in their paper, "Privacy Amplification by Public Discussion."[11] In Bruce Schneier's book Applied Cryptography, other characters are listed.[12]

Cast of characters

Cryptographic systems

The most common characters are Alice and Bob. Eve, Mallory, and Trent are also common names, and have fairly well-established "personalities" (or functions). The names often use alliterative mnemonics (for example, Eve, "eavesdropper"; Mallory, "malicious") where different players have different motives. Other names are much less common and more flexible in use. Sometimes the genders are alternated: Alice, Bob, Carol, Dave, Eve, etc.[13]

Alice and BobThe original, generic characters. Generally, Alice and Bob want to exchange a message or cryptographic key.
Carol, Carlos or CharlieA generic third participant.
Chuck or ChadA third participant, usually of malicious intent.[14]
CraigA password cracker, often encountered in situations with stored passwords.
Dan, Dave or David A generic fourth participant.
ErinA generic fifth participant, but rarely used, as "E" is usually reserved for Eve.
Eve or YvesAn eavesdropper, who is usually a passive attacker. While they can listen in on messages between Alice and Bob, they cannot modify them. In quantum cryptography, Eve may also represent the environment.
FaytheA trusted advisor, courier or intermediary. Faythe is used infrequently, and is associated with faith and faithfulness. Faythe may be a repository of key service or courier of shared secrets.
FrankA generic sixth participant.
GraceA government representative. For example, Grace may try to force Alice or Bob to implement backdoors in their protocols. Grace may also deliberately weaken standards.[15]
HeidiA mischievous designer for cryptographic standards, but rarely used.[16]
IvanAn issuer, mentioned first by Ian Grigg in the context of Ricardian contracts.[17]
JudyA judge who may be called upon to resolve a potential dispute between participants. See Judge Judy.
Mallory[18] or (less commonly) Mallet or DarthA malicious attacker. Associated with Trudy, an intruder. Unlike the passive Eve, Mallory is an active attacker (often used in man-in-the-middle attacks), who can modify messages, substitute messages, or replay old messages. The difficulty of securing a system against a Mallory is much greater than against an Eve.
Michael or MikeUsed as an alternative to the eavesdropper Eve, from microphone.
NiajUsed as an alternative to the eavesdropper Eve in several South Asian nations.[19]
OliviaAn oracle, who responds to queries from other participants. Olivia often acts as a "black box" with some concealed state or information, or as a random oracle.
OscarAn opponent, similar to Mallory, but not necessarily malicious.
Peggy or PatA prover, who interacts with the verifier to show that the intended transaction has actually taken place. Peggy is often found in zero-knowledge proofs.
RupertA repudiator who appears for interactions that desire non-repudiation.
SybilA pseudonymous attacker, who usually uses a large number of identities. For example, Sybil may attempt to subvert a reputation system. See Sybil attack.
Trent or TedA trusted arbitrator, who acts as a neutral third party.
TrudyAn intruder.
Victor or Vanna[20] A verifier, who requires proof from the prover.
WalterA warden, who may guard Alice and Bob.
WendyA whistleblower, who is an insider with privileged access capable of divulging information.

Interactive proof systems

For interactive proof systems there are other characters:

Arthur and MerlinMerlin provides answers, and Arthur asks questions.[21] Merlin has unbounded computational ability (like the wizard Merlin). In interactive proof systems, Merlin claims the truth of a statement, and Arthur (like King Arthur), questions him to verify the claim.
Paul and CarolePaul asks questions, and Carole provides answers. In the solution of the Twenty Questions problem, Paul (standing in for Paul Erdős) asked questions and Carole (an anagram of "oracle") answered them. Paul and Carole were also used in combinatorial games, in the roles of pusher and chooser.[22]
Arthur and BerthaArthur is the "left", "black", or "vertical" player, and Bertha is the "right", "white", or "horizontal" player in a combinatorial game. Additionally, Arthur, given the same outcome, prefers a game to take the fewest moves, while Bertha prefers a game to take the most moves.[23]

Physics

The names Alice and Bob are often used to name the participants in thought experiments in physics.[24] [25] More alphabetical names, usually of alternating gender, are used as required, e.g. "Alice and Bob (and Carol and Dick and Eve)".[26]

In experiments involving robotic systems, the terms "Alice Robot" and "Bob Robot" refer to mobile platforms responsible for transmitting quantum information and receiving it with quantum detectors, respectively, within the context of the field of quantum robotics.[27] [28] [29] [30] [31] [32]

Climate Change

A significant challenge with understanding climate change is the abstract nature of the problem, and the difficulty in relating it to personal actions and consequences. The names Alice and Bob have been used in this context to illustrate emissions and climate consequences on a personal level.[33]

See also

External links

Notes and References

  1. Rivest . Ron L. . Ron Rivest . Adi . Shamir . Adi Shamir . Len . Adleman . Leonard Adleman . 1978-02-01 . A Method for Obtaining Digital Signatures and Public-key Cryptosystems . Communications of the ACM . 21 . 2 . 120–126 . 10.1145/359340.359342 . 0001-0782 . 10.1.1.607.2677. 2873616 .
  2. Book: Newton, David E.. Encyclopedia of Cryptography. 1997. Instructional Horizons, Inc. Santa Barbara California. 10.
  3. Book: Rivest . Ron L. . Ron Rivest . Adi . Shamir . Adi Shamir . Len . Adleman . Leonard Adleman . On Digital Signatures and Public-Key Cryptosystems . Cambridge MA . Massachusetts Institute of Technology . April 1977.
  4. Book: Rivest . Ron L. . Ron Rivest . Adi . Shamir . Adi Shamir . Len . Adleman . Leonard Adleman . Cryptographic Communications System and Method . 4405829 . Cambridge MA . 1977 . September 20, 1983.
  5. Web site: Security's inseparable couple: Alice & Bob . NetworkWorld . 7 February 2005 . Bob . Brown.
  6. Book: Rabin, Michael O. . Michael O. Rabin . How to exchange secrets with oblivious transfer . Technical Report TR-81 . Aiken Computation Lab, Harvard University . 1981.
  7. Blum . Manuel . Manuel Blum . Coin Flipping by Telephone a Protocol for Solving Impossible Problems . ACM SIGACT News . 15 . 1 . November 10, 1981 . 23–27. 10.1145/1008908.1008911 . 19928725 . free .
  8. 10.1145/357360.357368 . How to exchange (Secret) keys . 1983 . Blum . Manuel . Manuel Blum . ACM Transactions on Computer Systems . 1 . 2 . 175–193. 16304470 . free .
  9. Visualization of cryptographic protocols with GRACE . 10.1016/j.jvlc.2007.05.001 . Journal of Visual Languages & Computing . 19 . 2 . April 2008 . 258–290 . Giuseppe . Cattaneoa . Alfredo . De Santisa . Umberto . Ferraro Petrillo.
  10. Web site: Gordon . John . The Alice and Bob After Dinner Speech . Zurich . April 1984 .
  11. 10.1137/0217014 . Privacy Amplification by Public Discussion . 1988 . Bennett . Charles H. . Brassard . Gilles . Robert . Jean-Marc . SIAM Journal on Computing . 17 . 2 . 210–229. 5956782 .
  12. Book: Schneier, Bruce . Bruce Schneier . Applied Cryptography: Protocols, Algorithms and Source Code in C . Hoboken, NJ . John Wiley & Sons . 2015 . 978-0-471-59756-8.
  13. Xue. Peng. Wang. Kunkun. Wang. Xiaoping. Efficient multiuser quantum cryptography network based on entanglement. Scientific Reports. 7. 1. 2017. 45928. 2045-2322. 10.1038/srep45928. 28374854. 5379677. 2017NatSR...745928X. free. An example from quantum cryptography with Alice, Bob, Carol, and David.
  14. Book: Tanenbaum, Andrew S. . Distributed Systems: Principles and Paradigms . 978-0-13-239227-3 . . 2007 . 171;399 - 402 .
  15. 2003.11511 . Cho . Hyunghoon . Ippolito . Daphne . Yun William Yu . Contact Tracing Mobile Apps for COVID-19: Privacy Considerations and Related Trade-offs . 2020 . cs.CR .
  16. Book: Fried . Joshua . Gaudry . Pierrick . Heninger . Nadia . Nadia Heninger . Thomé . Emmanuel . Advances in Cryptology – EUROCRYPT 2017 . A Kilobit Hidden SNFS Discrete Logarithm Computation . University of Pennsylvania and INRIA, CNRS, University of Lorraine . Lecture Notes in Computer Science . 2017 . 10,210 . 202–231 . 10.1007/978-3-319-56620-7_8 . 1610.02874 . 978-3-319-56619-1 . 12341745 . 2016-10-12.
  17. Web site: Grigg. Ian. Ivan The Honourable. iang.org . 2002-11-24.
  18. Szabo . Nick . Nick Szabo . September 1997 . Formalizing and Securing Relationships on Public Networks . First Monday. 2 . 9 . 10.5210/fm.v2i9.548. 33773111 . free .
  19. Web site: A Collaborative Access Control Framework for Online Social Networks.
  20. 1992 . Algebraic Methods for Interactive Proof Systems . Journal of the ACM . 39 . 4 . 859–868 . 10.1145/146585.146605 . Carsten Lund . Carsten . Lund . etal . 10.1.1.41.9477. 207170996 .
  21. Babai . László . Moran . Shlomo . Arthur-Merlin games: A randomized proof system, and a hierarchy of complexity classes . . April 1988 . 36 . 2 . 254–276 . 10.1016/0022-0000(88)90028-1 . free .
  22. Book: Muthukrishnan, S. . S. Muthukrishnan (computer scientist) . Data Streams: Algorithms and Applications . 978-1-933019-14-7 . Now Publishers . 2005 . 3 .
  23. Book: Conway, John Horton . On Numbers and Games . CRC Press . 2000 . 9781568811277 . 71, 175, 176.
  24. Web site: Alice and Bob communicate without transferring a single photon . physicsworld.com . 16 April 2013 . en-GB . 2017-06-19.
  25. Frazier . Matthew . Taddese . Biniyam . Antonsen . Thomas . Anlage . Steven M. . 2013-02-07 . Nonlinear Time Reversal in a Wave Chaotic System . Physical Review Letters . en-US . 110 . 6 . 063902 . 10.1103/physrevlett.110.063902 . 23432243 . 1207.1667 . 2013PhRvL.110f3902F. 35907279 .
  26. Web site: 209: Notes on Special Relativity . 5 March 2000 . N. . David Mermin . N. David Mermin. An example with several names.
  27. Farbod Khoshnoud, Lucas Lamata, Clarence W. De Silva, Marco B. Quadrelli, Quantum Teleportation for Control of Dynamic Systems and Autonomy, Journal of Mechatronic Systems and Control, Volume 49, Issue 3, pp. 124-131, 2021.
  28. Lamata . Lucas . Quadrelli . Marco B. . de Silva . Clarence W. . Kumar . Prem . Kanter . Gregory S. . Ghazinejad . Maziar . Khoshnoud . Farbod . Quantum Mechatronics . Electronics . 12 October 2021 . 10 . 20 . 2483 . 10.3390/electronics10202483 . free .
  29. Farbod Khoshnoud, Maziar Ghazinejad, Automated quantum entanglement and cryptography for networks of robotic systems, IEEE/ASME International Conference on Mechatronic and Embedded Systems and Applications (MESA), IDETC-CIE 2021, Virtual Conference: August 17 – 20, DETC2021-71653, 2021.
  30. Khoshnoud . Farbod . Aiello . Clarice . Quadrelli . Bruno . Ghazinejad . Maziar . De Silva . Clarence . Khoshnoud . Farbod . Bahr . Behnam . Lamata . Lucas . Modernizing Mechatronics course with Quantum Engineering . ASEE Conferences . 23 April 2021 . 10.18260/1-2--38241 . 2021 ASEE Pacific Southwest Conference - "Pushing Past Pandemic Pedagogy: Learning from Disruption". free . PDF
  31. Khoshnoud . Farbod . Esat . Ibrahim I. . de Silva . Clarence W. . Quadrelli . Marco B. . Quantum Network of Cooperative Unmanned Autonomous Systems . Unmanned Systems . April 2019 . 07 . 2 . 137–145 . 10.1142/S2301385019500055 . 149842737 . 7 September 2023 . en . 2301-3850.
  32. Farbod Khoshnoud, Marco B. Quadrelli, Enrique Galvez, Clarence W. de Silva, Shayan Javaherian, B. Bahr, M. Ghazinejad, A. S. Eddin, M. El-Hadedy, Quantum Brain-Computer Interface, ASEE PSW, 2023, in press.
  33. Web site: Alice, Bob and the Climate . 4 July 2024 . Carl Edward . Rasmussen .